fibula 发表于 2025-3-28 16:47:13
IoT Big Data Analytics with Fog Computing for Household Energy Management in Smart Gridsg, storage, and classification analysis. The design architecture and requirements of the proposed framework are illustrated in this paper while the analytics components are validated using datasets acquired from real homes.预兆好 发表于 2025-3-28 19:39:41
http://reply.papertrans.cn/87/8688/868787/868787_42.pngBumptious 发表于 2025-3-28 23:55:00
Effectiveness of Hard Clustering Algorithms for Securing Cyber Spacever, our investigation ensures the effectiveness of hard clustering for individual attacks. The experimental results reveal the performance of a number of hard clustering techniques. The insights from this paper will help both the cyber security and data science community to design robust techniques for securing cyber space.波动 发表于 2025-3-29 06:49:44
A Multi-factor Authentication Method for Security of Online Examinationsctoring. The study also evaluated effectiveness of the proposed method. The findings indicate that dynamic profile questions are highly effective. The security analysis shows that impersonation attack was not successful.倒转 发表于 2025-3-29 10:44:14
http://reply.papertrans.cn/87/8688/868787/868787_45.pngImmunotherapy 发表于 2025-3-29 12:51:20
An Implementation of Harmonizing Internet of Things (IoT) in Cloudferent purposes. Since IoT generates huge amount of data, we need some scalable storage to store and compute the data sensed from the sensors. To overcome this issue, we need the integration of cloud and IoT so that the data might be stored and computed in a scalable environment. Harmonization of IoHay-Fever 发表于 2025-3-29 16:52:10
http://reply.papertrans.cn/87/8688/868787/868787_47.png胆大 发表于 2025-3-29 20:16:57
Secured Cancer Care and Cloud Services in IoT/WSN Based Medical Systemson as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harn改变 发表于 2025-3-30 01:18:22
Privacy Preserving for Location-Based IoT Servicescations may disclose some private location information of users due to lack of privacy protection mechanism, which could result in serious security issues. To protect users’ confidential data, an efficient and secure private proximity testing (ESPT) scheme is designed for location-based IoT servicesMOCK 发表于 2025-3-30 04:12:10
Smart Home Security Application Enabled by IoT:me automation and security systems. These systems usually consist of a sensing and actuating layer that is made up of sensors such as PIR (Passive Infra-red) sensors, also known as motion sensors; temperature sensors; smoke sensors, and web cameras for security surveillance. These sensors, smart ele